I’m a technical kinda guy, doing technical kinda stuff.
As another poster has mentioned, M-Discs are written using a Blu-ray writer and are good for a few hundred years, in theory.
Blu-Ray USB drive and M-Discs is about the best you can get at present. Keep the drive unplugged when not in use, it’ll probably last 10-20 years in storage.
Seeing as there hasn’t been much advance past Blu-ray, keep an eye out for something useful to replace it in the future, or at least get another drive when you notice them becoming scarce.
They need to learn how to use their tools better. Winscp does all that transparently for you if you press F4 on a file on a remote system. Or maybe they did and you just didn’t see it…
It’s quite a handy function when you’re diving through endless layers of directories on a remote box looking for one config file amongst many.
If library devs do versioning correctly, and you pin to major versions like “1.*” instead of just the “anything goes” of “*”, this should not happen.
Your unit tests should catch regressions, if you have enough unit tests. And of course you do, because we’re all operating in the dream world of, “I am great and everyone else is shit”.
how the IT team tries to justify being locked into Microsoft, and then telling me I could potentially become a point of vulnerability
Because they can manage and control all the windows PCs , pushing updates automatically, restricting what users can do locally and on the network, they have monitoring tools and whatever antivirus and antimalware tools they have, and are able to easily manage and deploy/remove software and associated group licensing and so on and so forth.
Meanwhile you’re a single user of unknown (to them) capabilities that they now have to trust with the rest of their system, basically.
The first rule of corporate IT is, “control what’s on your network”. Your PC is their concern still, but they have no effective control over it. That’s why they’re being a bit of a pain in the ass about it.
There was a series of books in the '80s where a systems programmer gets pulled through a portal into your typical magical world, good vs evil, etc.
They subsequently look at the magical spells in use and realise they can apply Good Systems Programming Practices™ to them. And thus, with their knowledge of subroutines and parallel processing, they amplify their tiny innate magical abilities up to become a Pretty Good Magician™. So while all the rest of the magicians basically have to construct their spells to execute in a linear fashion, they’re making magical subroutines and utility functions and spawning recursive spells without halting checks and generally causing havoc.
It’s quite a good allegory for modern times, where a select few build all the magic and the rest just have useful artefacts they use on a day to day basis with no idea how they work
Someone with only a tenuous grip on their sanity, I’d imagine.
Energy efficiency can be offset by extra computational ability though.
Eg Linux has a plethora of CPU and IO schedulers and allows you to tune the system to maximise performance for your particular workload. Getting more performance than with the generic CPU and IO schedulers provided in other OS’s generally means more power consumption, unless you do some sort of “performance per watt” calculation to take that into account.
Have a look here at the ICMP source code in the Linux kernel at line 400. That is the ICMP reply code.
At lines 433/434 you can see the collection of the source and destination MAC addresses from the incoming packet. The source is just lifted directly from the packet, the destination is done with a helper function that presumably looks at which interface it arrived on and returns the MAC address of that interface.
Lines 441 onwards construct the reply packet and push it to the generic ICMP transmit function (which is a bit higher up in the source code), which then pushes it on to the network stack.
Hope that gives you an idea of how it works internally! It’s really only a slightly more detailed version of the actual standard, there are a few checks to make sure that we are not exceeding network rate limits in the stack and etc, but it’s a quite simple bit of code.
Added edit: it’s “simple” at this point because a lot of the work has already been done. The packet has arrived via the network stack, it has been determined to be an ICMP packet, and it was sent here to this function. There are already functions that send packets out via the network stack, so this chunk of code just builds an appropriate packet and hands it on to be sent.
Jobs also believed that 3.5" was the perfect touchscreen size for the human hand, neglecting the fact that (a) the human hand size varies drastically and (b) people are willing to trade ergonomic perfection for more screen estate because it’s more usable that way.
What you have linked to is a high level overview of what happens in an ICMP response, regardless of what OS or network stack you are using.
If you ask me to describe what Linux would do at that kind of level, well, exactly that.
Bought the app, still get the ads…
That… sounds like something that you should reach out to @rmayayo@lemmy.world and talk about.
Let me know if I can explain it more clearly.
Multi-part MIME containing inline images is actually what you’re looking for and it’s fairly easy to implement.
Here’s an example. They handwave over the html section that actually refers to the inline images that they embed, but that’s the basic layout you need.
Australian here, in Finland. Holy shit it seems everyone smokes like chimneys here.
Never really thought about how much smoking has declined in Aus over the last 20-40 years, but yeah coming over here has been an eye opener.
Webrings were themed though, so if your interest was cars, or cats, or ham radio, you could get on a webring for one of those topics and cycle through them.
And it wasn’t all random, you could move left or right on the ring , or jump randomly. So a good webring manager could group sites together as you went around the ring as well.
Windows: “All your files are exactly where you left them.”
It was a client that let you browse Reddit on your phone, in a much nicer and more organised way than anything provided by Reddit itself.
All was fine until Reddit decided to monetise their API that Apollo - and many other apps - used. Now it would cost the app developer tens of thousands a month to maintain the connection, which is not something that they could sustain.
So for me, the day that Boost for Reddit stopped working, I stopped using Reddit.
McAfee wrote a program that used the Sqlite library for database storage.
When going about its data storage business for McAfee’s program, the Sqlite library was storing files in C:\temp with prefixes like sqlite_3726371.
Users see that and get angry, and bug the Sqlite developers.
Now probably when initialising the Sqlite library McAfee could have given it the location of a directory to keep it’s temp files. Then they could have been tucked away somewhere along with the rest of the McAfee code base and be more easily recognised as belonging to them, but they didn’t.
So because of a bit of careless programming on McAfee’s part, Sqlite developers were getting the heat because the files were easily recognisable as belonging to them.
Because the Sqlite developers don’t have control of what McAfee was doing, the most expedient way to solve the problem was to obfuscate the name a bit.
It did have a pretty catchy chorus.
Turns out it’s about an actual school shooting and not just disliking Mondays.
Back when a school shooting was actually something to write a song about.
I want a music playing alarm app that’s permanently locked to Sonny and Cher’s , “I got you babe”.